Comodo Help
Find the desired product help
Xcitium Enterprise

Xcitium Enterprise

Xcitium Enterprise Administrator Guide

English

Print Help Download Help
Continuous Threat Exposure Management(CTEM) Security > View All Assets
  • Introduction To Xcitium Enterprise - Endpoint Protection Platform
    • Key Concepts
    • Best Practices
    • Login Into The Admin Console
    • Upgrade To Full Version
  • The Admin Console
  • The Dashboards
    • CTEM Dashboard
    • CTEM Metrics
    • CTEM Compliance
  • CNAPP Dashboard
  • ROI Dashboard
  • Devices And Device Groups
    • Manage Device Groups
      • Create Device Groups
      • Edit A Device Group
      • Assign Configuration Profiles To A Device Group
      • Remove A Device Group
      • Run Procedures On Device Groups
    • Manage Devices
      • Add New Devices
      • Manage Windows Devices
        • View And Edit Device Name
        • View Summary Information
        • View Network Information
        • View And Manage Profiles Associated With A Device
        • View Maintenance Windows Associated With A Device
        • View And Manage Applications Installed On A Device
        • View The Files On A Device
        • View Exported Configurations And Import Profiles
        • View MSI Files Installed On A Device Through Xcitium
        • View And Manage Patches For Windows And 3rd Party Applications
        • View Antivirus Scan History
        • View And Manage Device Group Memberships
        • View Device Logs
      • Manage Mac OS Devices
        • View And Edit Mac OS Device Name
        • Summary Information Of Mac Device
        • View Installed Applications
        • View Quarantined Files On Mac OS Device
        • View And Manage Profiles Associated With A Device
        • View Packages Installed On A Device Through Xcitium
        • View And Manage Device Group Memberships
        • View Mac Device Logs
      • Manage Linux Devices
        • View And Edit Linux Device Name
        • Summary Information Of Linux Device
        • View Network Information Of A Linux Device
        • View And Manage Profiles Associated With A Linux Device
        • View Linux Packages Installed On A Device Through Dragon
        • View And Manage Device Group Memberships
      • Manage Android Devices
        • View And Edit Device Name
        • View Summary Information
        • Manage Installed Applications
        • View And Manage Profiles Associated With A Device
        • View Sneak Peek Pictures To Locate Lost Devices
        • View The Location Of The Device
        • View And Manage Device Group Memberships
      • Manage IOS Devices
        • View And Edit Device Name Of An IOS Device
        • View Summary Information Of An IOS Device
        • View Applications Installed On An IOS Device
        • View And Manage Profiles Associated With An IOS Device
        • View The Location Of An IOS Device
        • View And Manage Group Memberships Of An IOS Device
      • View User Information
      • Remote Management Of Windows And Mac OS Devices
        • Transfer Items To / From The Remote Computer
      • Remotely Manage Folders And Files On Windows Devices
      • Manage Processes On Remote Windows Devices
      • Manage Services On Remote Windows Devices
      • Use The Command Prompt On Remote Windows Devices
      • View Event Logs On Remote Windows Devices
      • Apply Procedures To Windows And Mac Devices
      • Remotely Install And Manage Packages On Windows Devices
      • Remotely Install Packages On Mac OS Devices
      • Remotely Install Packages On Linux Devices
      • Send Enrollment Link To IOS Devices
      • Generate An Alarm On Android Devices
      • Remotely Lock Mobile And Mac OS Devices
      • Wipe Selected Mobile And Mac Devices
      • Assign Configuration Profiles To Selected Devices
      • Set / Reset Screen Lock Password For Mobile Devices
      • Update Device Information
      • Send Text Messages To Mobile Devices
      • Restart Selected Windows Devices
      • Change A Device's Owner
      • Change The Ownership Status Of A Device
      • Add Custom Notes And Tags On Devices
      • Remove A Device
      • Generate Device List Report
      • Manage Isolate And Release From Isolation
    • Bulk Enrollment Of Devices
      • Enroll Windows, Mac OS And Linux Devices By Installing The Communication Client
        • Enroll Windows Devices Via AD Group Policy
        • Enroll Windows, Mac OS And Linux Devices By Offline Installation Of Agent
        • Enroll Windows Devices Using Auto Discovery And Deployment Tool
      • Enroll Android And IOS Devices Of AD Users
    • Download And Install The Remote Control Tool
  • Cloud Workloads
  • Cloud Assets
  • Cloud Security
    • View Vulnerabilities Findings
    • Registry Scan
    • CSPM Executive Dashboard
    • Compliance Summary
    • CWPP Dashboard
    • App Behavior
    • Manage Policies
    • Remediation
    • View Alerts
    • Manage Triggers
    • View Reports
  • Continuous Threat Exposure Management(CTEM) Security
    • CTEM Agents
    • View All Assets
  • Users And User Groups
    • Manage Users
      • Create New User Accounts
        • Manually Add Users
        • Import Users From A CSV File
      • Enroll User Devices For Management
        • Enroll Android Devices
        • Enroll IOS Devices
        • Enroll Windows Endpoints
        • Enroll Mac OS Endpoints
        • Enroll Linux OS Endpoints
      • View User Details
        • Update The Details Of A User
      • Assign Configuration Profiles To User Devices
      • Remove A User
      • Generate New Password For A User
      • Reset Two Factor Authentication Token For A User
      • Run Procedures On User Devices
    • Manage User Groups
      • Create A New User Group
      • Edit A User Group
      • Assign Configuration Profiles To A User Group
      • Remove A User Group
      • Run Procedures On User Group Devices
    • Configure Role Based Access Control For Users
      • Create A New Role
      • Manage Permissions And Users Assigned To A Role
      • Remove A Role
      • Manage Roles Assigned To A User
  • Configuration Templates
    • Create Configuration Profiles
      • Profiles For Android Devices
      • Profiles For IOS Devices
      • Profiles For Windows Devices
        • Create Windows Profiles
          • Associated Devices Settings
          • Antivirus Settings
          • Communication Client And Xcitium Client - Security Application Update Settings
          • File Rating Settings
          • Firewall Settings
          • HIPS Settings
          • Containment Settings
          • Maintenance Window Settings
          • VirusScope Settings
          • Xcitium Verdict Cloud
          • Global Proxy Settings
          • Client Proxy Settings
          • Agent Discovery Settings
          • Communication Client And Xcitium Client - Security Application UI Settings
          • Logging Settings
          • Client Access Control
          • External Devices Control Settings
          • Monitors
          • Procedure Settings
          • Remote Control Settings
          • Remote Tools Settings
          • Miscellaneous Settings
          • Script Analysis Settings
          • Data Loss Prevention Settings
          • Patch Management Settings
          • Performance Settings
          • Thumbnails Settings
          • Chat Settings
          • Applications Settings
        • Import Windows Profiles
      • Profiles For Mac OS Devices
        • Create A Mac OS Profile
          • Antivirus Settings For Mac OS Profile
          • Certificate Settings For Mac OS Profile
          • Restrictions Settings For Mac OS Profile
          • VPN Settings For Mac OS Profile
          • Wi-Fi Settings For Mac OS Profile
          • Remote Control Settings For Mac OS Profile
          • External Device Control Settings For Mac OS Profile
          • Valkyrie Settings For MacOS Profile
          • Procedure Settings For Mac Profiles
          • Monitor Settings For Mac OS Profile
      • Profiles For Linux Devices
        • Create A Linux Profile
          • Antivirus Settings For Linux Profile
          • Communication Client And XcitiumClient - Security Application Update Settings For Linux Profile
          • User Interface Settings For Linux Profile
          • Logging Settings For Linux Profile
          • Clients Access Control Settings For Linux Profile
          • Valkyrie Settings For Linux Profile
    • View And Manage Profiles
      • Export And Import Configuration Profiles
      • Clone A Profile
    • Edit Configuration Profiles
    • Manage Default Profiles
    • Manage Alerts
      • Create A New Alert
      • Edit / Delete An Alert
    • Manage Procedures
      • View And Manage Procedures
      • Create A Custom Procedure
      • Combine Procedures To Build Broader Procedures
      • Review / Approve / Decline New Procedures
      • Add A Procedure To A Profile / Procedure Schedules
      • Import / Export / Clone Procedures
      • Change Alert Settings
      • Apply Procedures To Devices
      • Edit / Delete Procedures
      • View Procedure Results
    • Manage Monitors
      • Create Monitors And Add Them To Profiles
        • Monitors For Windows Devices
        • Monitors For Mac OS Devices
      • View And Edit Monitors
    • Data Loss Prevention Rules
      • Create DLP Discovery Rules And Add Them To Profiles
      • View And Edit DLP Discovery Rules
      • Create DLP Monitoring Rules And Add Them To Profiles
      • View And Edit DLP Monitoring Rules
  • Security Systems
    • View Alerts And Security Events
      • View Alerts And Security Events By Time
      • View Alerts And Security Events By Files
      • View Alerts And Security Events By Device
      • Alert Policy
      • Suppression Rule
    • Investigate Events
      • Search Events By Query
      • Search Events By File
      • Search Events By Device
      • View Android Threat History
      • Process Timeline
    • Endpoint Security Status
      • Run Antivirus And/or File Rating Scans On Devices
      • Handle Malware On Scanned Devices
      • Update Virus Signature Database On Windows, Mac OS And Linux Devices
    • View And Manage Blocked Threats
    • View And Manage Quarantined Items
    • View Contained Threats
    • View And Manage Autorun Items
    • Manage File Trust Ratings On Windows Devices
      • File Ratings Explained
    • View List Of File Verdicts
    • View History Of External Device Connection Attempts
    • Data Loss Prevention Scans
      • DLP Logs
      • DLP Quarantined Files
  • Network Management
    • Create And Run Network Discovery Tasks
    • Manage Profiles For Network SNMP Devices
    • Manage Network Devices
      • Manage SNMP Devices
        • SNMP Device Details Interface
      • Discovered Devices
    • Manage Network Monitors
  • Software Inventory
    • View Applications Installed On Android And IOS Devices
      • Blacklist And Whitelist Applications
    • Basic Patch Management
      • Manage OS Patches On Windows Endpoints
      • Install 3rd Party Application Patches On Windows Endpoints
        • Xcitium Supported 3rd Party Applications
    • Continuous Threat Exposure Management (CTEM)
    • View And Manage Applications Installed On Windows Devices
      • Uninstall A Windows Application From Selected Devices
      • Uninstall A Windows Application From All Devices
    • Vulnerability Management
  • Management Settings
    • Account Management
    • License Management
      • Manage Your Licenses
      • License Allocations
      • Bill Forecast
  • Configure Xcitium Enterprise
    • Email Notifications, Templates And Custom Variables
      • Configure Email Templates
      • Configure Email Notifications
      • Create And Manage Custom Variables
      • Create And Manage Registry Groups
      • Create And Manage COM Groups
      • Create And Manage File Groups
      • Create And Manage Tags
    • Xcitium Enterprise Portal Configuration
      • Import User Groups From LDAP
      • Configure Portal Settings
      • Configure Communication And Security Client Settings
        • Configure The Xcitium Android Client
          • Configure Android Client General Settings
          • Configure Android Client Antivirus Settings
          • Add Google Cloud Messaging (GCM) Token
        • Add Apple Push Notification Certificate
        • Configure Windows Clients
          • Configure Communication Client Settings
          • Configure Client Security Settings
      • Manage Xcitium Enterprise Extensions
      • Configure Xcitium Enterprise Reports
      • Device Removal Settings
      • Account Security Settings
      • Set-up Administrator's Time Zone And Language
      • Configure Audit Log Settings
    • Dashboard Settings
    • Cloud Security Settings
      • Manage Cloud Accounts
        • Amazon Web Server (AWS) Account Onboarding
        • Google Cloud Platform (GCP) Account Onboarding
        • Microsoft Azure Account Onboarding
      • Manage Cluster
      • Configure Integrations
        • CWPP
        • CSPM
        • Registry
        • S3 Data Source
      • Create And Manage Labels
      • Create And Manage Tags
      • Create And Manage Groups
      • Configure Ticket Template
    • CTEM Settings
    • Data Protection Templates
      • View And Manage Pattern Variables
      • View And Manage Keyword Groups
    • View Version And Support Information
    • Alert Notification Settings
  • Appendix 1a - Xcitium Services - IP Nos, Host Names And Port Details - EU Customers
  • Appendix 1b - Xcitium Services - IP Nos, Host Names And Port Details - US Customers
  • Appendix 2 - Pre-configured Profiles
  • Appendix 3 - Default Xcitium Security Policy Details
  • About Xcitium

View All Assets


All Assets is a collection of all the company's assets. This includes all agents installed and any IP-based assets discovered through network or probe scanning. Assets generally encompass workstations, servers, firewalls, switches, printers, access points, and IoT devices.

  • Security < Continuous Threat Exposure Management < 'All Assets'

Access All Assets from the Assets category. Here, you will see the default view that includes the asset details.




You can access your assets from the multiline table view. You can also easily navigate to asset details via click-through links or use the global search, sort, and filtering options.

Following Action Tool bar options are available:
  • Add Asset - Tap to add a new Asset manually; this requires a probe agent to be available and associated with the manual asset. The probe will scan the manual asset.


  • Sort - Tap the sorting options, including your choice of Fields and Order.


  • Filter - Tap to use our built-in field selections to filter the assets.


  • Filter by Tags - Tap to view the Include Filter Tag and Exclude Filter Tag options:


  • Refresh - Tap to Refresh the table/asset details:


  • Download Data - Tap to download the Assets data into CSV.


  • Switch Table View - Tap the toggle to use Table View



    Tap on the X in the top-right corner to exit the table view.



The table view shows critical vulnerability data, security grade, risk score, user information, and more. The column view and reorder options allow you to set and reorder the table view.



Column data includes the following options:

Column Label  Description 
Status   Displays the online status
IP   Displays the Asset's IP address
Host Name   Displays the hostname
FQDN Name   Displays the fully qualified domain name
OS Name   Displays the operating system name 
Logon User   Displays the last login user name (local or domain)
Scanned By   Displays which agent scanned the asset.
Risk Score 
 Displays the Risk Score for the asset; Tap to see the details of the Risk Score calculation.

 Risk score statistics are updated every 12 hours, so there may occasionally be a delay in reflecting the most recent changes. You can use the Refresh Risk   option in the top tool bar of the Portal to force the update which should reflect with 15 minutes in the Portal  
Max Risk Score   Displays the asset's Max Risk Score, which is determined by calculating the highest possible risk score based on the most severe confirmed vulnerability.
Security Grade   Displays the security grade A-F where A is good and low-risk.
Importance   Displays the selected Importance of the Asset; the user at the asset level defines this; by default, all assets are set to Low unless changed.
Agent Type   Displays the agent type as Lightweight or Probe.
Manufacturer   Displays the manufacturer.
Vulnerabilities   Displays the total count of all discovered vulnerabilities for all categories.
Critical   Displays the total count of Critical vulnerabilities.
High   Displays the total count of High vulnerabilities.
Medium   Displays the total count of Medium vulnerabilities.
Low   Displays the total count of Low vulnerabilities.
Informational   Displays the count of informational findings that are not classified as vulnerabilities
Registry   Displays registry-related findings or configuration data 
Last Scanned Time   Displays the date/time stamp when the asset was last scanned
Domain Status   Displays as WorkGroup for non-domain joined, AzureADJoined, or Domain Name as specified by the OU
MAC Address   Displays the MAC address of the asset’s primary network interface.
Action   Following options are available - Asset Timeline, Remove Asset, Deprecate Asset, Scan Now, Refresh Risk Score


Asset details are found in 3 main panels where all the detailed information is found about the asset.

The first pod of information:



Tab Name   Description
 System Information Displays key asset details including device name, agent type, agent version, and unique identifier. Highlights the asset’s current importance level, last logon user, and calculated Risk Score. Also includes IP and MAC address, along with timestamps for last scan, discovery, and ping. An editable field allows assignment of an asset owner. 

As you continue scrolling down the System Information panel you will also view the following
  • Security Report Card - Displays the Security Report Card details. This includes checking against detected Insecure Listening Ports, Supported OS, Backup Software, Local Firewall, Network Vuls, Anti Ransomware, System Aging, Failed Login, and Antivirus information.

  • Compliance Report Card - Displays the Compliance Report Card details. This includes checking against TLS versions, PowerShell, SMB, LLMNR, NTLMV1, and NBTNS data.
 Problems Displays the discovered Problems, which are the vulnerabilities and security check/information categories by the Problem Category groups. Tap on the drop-down to toggle between the groups.

Displays Registry, Driver Vulnerabilities and Remediation 

Use the three dot action menu to suppress. At the Company level you will have two options one to suppress or use to the integration action.
 Solutions Displays the product-level Remediation Plan action items; these are the solutions to remediate the problems. 
 Compliance Displays results from any Compliance Scan Type(s) enabled for the selected company and asset.

Tap between the Compliant, Manual, and Non-Compliant Tabs for more info. 
 Internal Ports Displays the detected ports with protocol, address, and system info. 
 External Ports Displays the list of externally accessible ports detected by the Probe Agent. This includes port number, service name, protocol, product, status (open/closed/filtered), and associated vulnerabilities. 
 Software Displays the detected installed software from the selected asset.

You can see the Uninstall Path, Vulnerability Info, and other details.


Below that, you will find the next set of pod information that includes:



Tab Name   Tab Description
 System  Displays system information like hardware and operating system specs, uptime, and system maintenance details

 
 Storage  Displays storage discovered with drive letter assignment and capacity status

 
 Network  Displays the discovered network interfaces: WiFi, Bluetooth, Ethernet, LAN, etc.

 
 CPU  Displays the CPU model, core, and speed specs

 
 BIOS  Displays the BIOS details

 
 Firewall Policy  Displays the local firewall policy; Domain, Public, and Standard Profiles
 
 

The following pod information in system information contains:



Tab Name  Description 
 Firewall Rules  Displays the local Firewall Rules for the selected asset. You can toggle between Inbound and Outbound rules.
 Ciphers  Cipher data is populated for probe-discovered assets, as it’s fetched directly from the Nmap scan results. Lightweight assets do not include cipher data by   default.
 If you’d like to collect cipher data for those assets, you can set up a probe machine mapped to all the assets and run a Network Scan. This will retrieve     the required cipher information. 
 Extension Programs  Displays the detected browser extension programs for the selected asset.
 Services  Displays the detected Services with the current status, user account, and path information.
 User Shares  Displays the detected User Shares from the asset; tap between the share names to browse the data.
 Users  Displays the detected User(s) accounts from the asset.
 Certificates  Displays detailed information about SSL/TLS certificates detected on the asset
 Unquoted Service Path  Displays any detected service with an unquoted service path.
 Installed Patches  Displays the detected installed security patches.
 Installed Drivers  Displays the detected installed drivers for the selected asset.
 Running Processes  Displays the detected running system processes for the selected asset.


Our Products
  • Free Antivirus
  • Free Internet Security
  • Website Malware Removal
  • Free Anti-Malware
  • Anti-Spam (Free Trial)
  • Windows Antivirus
  • Antivirus for Windows 7
  • Antivirus for Windows 8
  • Antivirus for Windows 10
  • Antivirus for MAC
  • Antivirus for Linux
  • Free Endpoint Security
  • Free ModSecurity
  • Free RMM
  • Free Website Malware Scanner
  • Free Device Manager for Android
  • Free Demo
  • Network Security
  • Endpoint Protection
  • Antivirus for Android
  • Comodo Antivirus
  • Wordpress Security
Cheap CDN
  • Bootstrap CDN
  • Semantic UI CDN
  • Jquery CDN
  • CDN Plans
  • CDN
  • Free CDN
Enterprise
  • Patch Management Software
  • Patch Manager
  • Service Desk
  • Website Down
  • Endpoint Protection Solutions
  • Website Security Check
  • Remote Monitoring and Management
  • Website Security
  • Device Manager
  • ITSM
  • CRM
  • MSP
  • Android Device Manager
  • MDR Services
  • Managed IT Support Services
  • Free EDR
Free SSL Certificate
Support Partners Terms and Conditions Privacy Policy

© Comodo Group, Inc. 2026. All rights reserved.